If you are using the LInux kernel, it is recommended to update as soon as possible. In case you are using a distribution kernel, you should check if the update for your distribution is available. As a precaution, you can apply the following preventive measures: Ensure that the XFS file-system is only mounted and used on trusted systems.
If you run a service that relies on a writable directory, ensure that the directory is owned by the correct group or any group that does not allow access. If necessary, change the group of the directory to a group that does not allow access.

A vulnerability was found in the USB subsystem of the Linux kernel that allows local users to cause a denial of service (DoS) by triggering usage of the non-maskable interrupt (NMI) vector. The NMI vector is a mechanism that allows one hardware device to signal another device to enter an interrupt request state. The NMI vector is used for devices that need to be rebooted or shut down, for example, a USB storage device. An attacker can provide a malicious USB device to a victim that allows the victim to trigger the NMI vector. This can lead to a system crash.
A similar issue was addressed in the Linux kernel in version 4.14. The fix was merged in the kernel version 4.15.

A vulnerability was found in the USB subsystem of the Linux kernel that allows local users to cause a denial of service (DoS) by triggering

Install the latest stable kernel

It is recommended to upgrade your Linux kernel.

The Linux kernel, it is recommended to update as soon as possible. In case you are using a distribution kernel, you should check if the update for your distribution is available. As a precaution, you can apply the following preventive measures:
A similar issue was addressed in the Linux kernel in version 4.14. The fix was merged in the kernel version 4.15.

Timeline

Published on: 08/24/2022 16:15:00 UTC
Last modified on: 08/29/2022 16:21:00 UTC

References